0% found this document useful (0 votes)
71 views15 pages

Purbanchal University Bachelor in Information Technology (BIT)

The document provides information about 4 courses - E-commerce, Wireless Communication Systems, Software Project Management, and System Administration - that are part of an 8th semester Bachelor of Information Technology program. It includes details about the course objectives, topics covered, teaching schedule, examination scheme, and reference books for the E-commerce and Wireless Communication courses. The summary is: The document outlines 4 courses that are part of an 8th semester Bachelor of Information Technology program, providing details about course objectives, topics, schedule, and references for 2 courses on E-commerce and Wireless Communication Systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views15 pages

Purbanchal University Bachelor in Information Technology (BIT)

The document provides information about 4 courses - E-commerce, Wireless Communication Systems, Software Project Management, and System Administration - that are part of an 8th semester Bachelor of Information Technology program. It includes details about the course objectives, topics covered, teaching schedule, examination scheme, and reference books for the E-commerce and Wireless Communication courses. The summary is: The document outlines 4 courses that are part of an 8th semester Bachelor of Information Technology program, providing details about course objectives, topics, schedule, and references for 2 courses on E-commerce and Wireless Communication Systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Purbanchal University

Bachelor in Information Technology (BIT)

Year: IV Semester: VIII


S. Course Course Credi Lectu Tutori Practi Tot
N Code description ts re al cal al
(Hrs) (Hrs) (Hrs) (Hr
s)
1 BIT470C E-commerce 3 3 1 2 6
O
2 BIT471C Wireless 3 3 1 2 6
O Communication
System
3 BIT473C Software Project 3 3 1 - 4
O Management
4 BIT480S Elective II(System 3 3 1 2 6
A Administration)
5 BIT479C App. Project 4 - 1 4 5
O
Total 16

List of electives II
1. Remote Sensing BIT480RS
2. Multimedia Communication BIT480MC
3. E-Governance BIT480EG
4. System Administration BIT480SA
5. Design and Analysis of Algorithm BIT480DA
6. Network Security and Cryptography BIT480NS
7. Image Processing and Pattern Recognition BIT480IP

130
bitnepal.blogspot.com
E-Commerce
BIT476CO
Year: IV Semester: VIII
Teaching Schedule Examination Scheme
Hours/Week
Theory Tutoria Practical Internal Final Total
l Assessment
3 1 2 Theory Practic Theory Practical 150
al
20 50 80 -

Course objective
 To introduce the concept, technologies and strategies of electronic commerce.
 To understand and familiarize with different models and infrastructures for
implementing online business.
 To understand the community concept and development of e-commerce sites.

Contents
1. Introduction to e-commerce
[4 Hrs]
1.1 E-commerce fundamentals and media convergence
1.2 Benefits of e-commerce
1.3 Internet’s influence on market and price
1.4 Overview of Just in Time and Quick response retailing inventory
system
1.5 Overview of supply chain management system

2. Internetworking and e-commerce


[5 Hrs]
2.1 History of internet
2.2 Overview of internet infrastructure
2.3 IP suit
2.4 Domain name service
2.5 ISP’s and connectivity options
2.6 Firewalls and network security
2.7 Types of security

131
bitnepal.blogspot.com
3. Web technologies [6
Hrs]
3.1 Importance of website design
3.2 Introduction to dynamic web pages
3.3 Properties of a good e-commerce site
3.4 Common protocols like HTTP and FTP

4. Business models
[4 Hrs]
4.1 fundamentals of business models
4.2 classification of business models
4.3 fundamentals of brokerages, advertising, infomediary, merchant,
manufacturer, affiliate, community, subscription and utility models

5. Electronic payment system


[6 Hrs]
5.1 Types of payment system
5.2 Properties of paper money
5.3 Electronic cash and its use
5.4 Electronic checks
5.5 Smart cards
5.6 Credit cards
5.7 Online credit card processing
5.8 Retailing in e-commerce

6. Security and encryption


[4 Hrs]
6.1 E-commerce security threats
6.2 Fundamentals of symmetric and public key cryptography
6.3 Digital signature
6.4 Digital certificate and authority

7. Marketing and advertisement


[6 Hrs]
7.1 How to be found and to find in the internet
7.2 Personalization
7.3 Virtual societies
7.4 Localization
7.5 Banner ads
7.6 User tracking and log file analyzing
132
bitnepal.blogspot.com
7.7 Push and pull advertising
7.8 Launching a new product

8. Other issues in e-commerce


[3 Hrs]
8.1 Intellectual properties
8.2 Governance: e-commerce laws, internet governing organizations and
cross boarder legal issues

9. Web application
[7 Hrs]
9.1 Basic concept of web application development
9.2 Website client and server side validation of control
9.3 Using different web application controls
9.4 Database connectivity with different DBMS
9.5 Building web application giving different features of e-commerce sites

The students are expected to complete an e-commerce based project


implementing the strategies and technologies learnt in the theory classes and
develop E-commerce websites using web based application.

Reference books
 Kalakota & Whinston, “Frontiers of Electronic Commerce”, Pearson education
(Addison Wesley) 2000, ISBN: 981-235-903-6.
 Daniel Amor, “The E-Business (R) evolution”, Pearson education, 2000,
ISBN:981-404-826-2

133
bitnepal.blogspot.com
Wireless Communication
BIT471CO
Year: IV Semester: VIII
Teaching Schedule Examination Scheme
Hours/Week
Theory Tutoria Practical Internal Final Total
l Assessment
3 1 2 Theory Practic Theory Practical 150
al
20 50 80 -
Course contents
1. Introduction [3
Hrs]
1.1 History and evolution of wireless communication: 1G, 2G, 3G, 4G
1.2 Basic definitions related to mobile communication
1.3 Paging system and cordless telephone system: simple concepts
1.4 Cellular communication system: components and process

2. Speech coding for wireless systems applications


[5 Hrs]
2.1 Introduction: definition and importance
2.2 Speech coders classification (hierarchy only)
2.3 Characteristics of speech signals: PDF, ACF, PSD
2.4 Frequency domain speech coding: sub-band coding, adaptive
transformation coding
2.5 Vocoders: speech generation model, types
2.6 Linear predictive coders: LPC vocoders and residual-exited LPC

3. Mobile communication concepts


[8 Hrs]
3.1 Introduction: cellular concept and fundamentals, advantages
3.2 Frequency reuse concept: hexagonal cells, cell cluster, channel
capacity, reuse ratio, cellular layout
3.3 Channel assignment strategies: fixed and dynamic
3.4 Handoff strategies: introduction, factors affecting handoff, MAHO,
prioritizing handoff, umbrella cell approach
3.5 Interference and system capacity: adjacent and co-channel
3.6 Improving coverage and capacity: cell splitting and cell sectoring

134
bitnepal.blogspot.com
4. Mobile radio propagation and models
[8 Hrs]
4.1 Free space propagation model
4.2 Fading: introduction; large scale, small scale
4.3 Practical link budget design using path loss models: log-distance path
loss, log-normal shadowing
4.4 Indoor propagation model: partition losses (same floor and between
floors)
4.5 Outdoor propagation model: Okumura model, Hata model, PCS
extension to Hata model
4.6 Factors influencing small scale fading, Doppler shift: definition and
derivation
4.7 Parameters of mobile multipath channels: time dispersion
parameters, coherence bandwidth, Doppler spread and coherence time
(definitions)
4.8 Types of small scale fading: flat vs frequency selective, fast vs slow
5. Modulation techniques
[6 Hrs]
5.1 Overview of digital modulation: advantages and factors influencing it
5.2 BPSK: Relation, Transmitter, Receiver
5.3 MSK: Relation, Transmitter, Receiver
5.4 GMSK: Relation, Transmitter, Receiver
5.5 MPSK: Relation, Transmitter, Receiver
5.6 MFSK: Relation, Transmitter, Receiver

6. Equalization and diversity techniques


[5 Hrs]
6.1 Introduction, importance and fundamentals of equalization
6.2 Diversity techniques: importance, practical space diversity
considerations, frequency, time
6.3 RAKE receiver: introduction and basic blocks

7. Multiple access techniques


[4 Hrs]
7.1 Overview of duplexing techniques: TDD and FDD
7.2 Types of multiple access techniques
7.3 FDMA: introduction and features
7.4 TDMA: introduction and features
7.5 CDMA: introduction and features
7.6 Comparison of multiple access techniques
135
bitnepal.blogspot.com
8. Wireless communication systems and standards
[6 Hrs]
8.1 Global system for mobile (GSM): services and features, system
architecture, radio subsystem, channel types, frame structure, signal
processing
8.2 IS-95: frequency and channel specifications, forward CDMA channel,
reverse CDMA channel
8.3 Recent developments in GSM and CDMA technology
Laboratory
Visit to the nearest district telecom center for case study and preparation of the
report for paper presentation. The prepared report must be submitted to the
respective teacher for the evaluation of the mark.
Reference books
 K. Feher, “Wireless Digital Communications”, PHI 2001
 W. Stallings, “Wireless Communications and Networks”, PEA, 2002

 T. Rappaport. “Wireless Communication: Principles and Practices”.


 J. Schiller, “Mobile Communications”, PEA, 2000
 B. P. Lathi, “Modem Digital and Analog Communication Systems”, third
edition, Oxford University press, 1999
 J. Proakis, M. Salchi, “Communication Systems Engineering”, Prentice Hall
New Jersey, 1994

136
bitnepal.blogspot.com
Software Project Management
BIT473CO
Year: IV Semester: VIII
Teaching Schedule Examination Scheme
Hours/Week
Theory Tutoria Practical Internal Final Total
l Assessment
3 1 - Theory Practic Theory Practical 100
al
20 - 80 -

Course objectives
 To know of how to project planning for the software process.
 To learn the cost estimation techniques during the analysis of the project.
 To understand the quality concepts for ensuring the functionality of the
software

Course contents
1. Software project management concepts
[9 Hrs]
Introduction to software project management: An overview of project
planning: select project, identifying project scope and objectives,
infrastructure, project products and characteristics, estimate efforts, identify
activity risks and allocate resources

2. Software evaluation and costing


[9 Hrs]
Project evaluation: strategic assessment, technical assessment, cost-benefit
analysis, cash flow forecasting, cost-benefit evaluation techniques, risks
evaluation, selection of appropriate project approach: choosing technologies,
choice of process models, structured methods

3. Software estimation techniques


[9 Hrs]
Software effort estimation: problems with over and under estimations, basis of
software estimation, software estimation techniques, expert judgment,
estimating by analogy, activity planning: project schedules, project and
activities, sequencing and scheduling activities, networks planning models,
formulating a network model

137
bitnepal.blogspot.com
4. Risk management [9
Hrs]
Risk management: nature of risk management, risk identification and analysis,
reducing the risk, resource allocation: scheduling resources, critical paths, cost
scheduling, monitoring and control: creating framework, cost monitoring,
prioritizing monitoring

5. Software quality management


[9 Hrs]
TQM, six sigma, software quality: defining software quality, ISO9126, external
standards, comparison of project management software’s: dot project, launch
pad, openProj, case study: PRINCE2

Reference books
 Boh Hughes & Mike Cotterell, “Software Project Management”, Tata MGraw,
Hill publications, fifth edition, 2012
 S. A. Kelkar, “Software Project Management”, PHI, New Delhi, Third edition,
2013
 Richard H. Thayer, “Software engineering Project Management”, IEEE
computer society
 Futrell, “Quality Software Project Management”, Pearson education India,
2008

138
bitnepal.blogspot.com
System Administration
BIT480SA
Year: IV Semester: VIII
Teaching Schedule Examination Scheme
Hours/Week
Theory Tutoria Practical Internal Final Total
l Assessment
3 1 2 Theory Practic Theory Practical 150
al
20 50 80 -

Course contents
1. Network architecture and networking software
[2 Hrs]
1.1 Mainframe architecture
1.2 Client/server architecture
1.2.1 Different client/server models
1.3 File server architecture
1.4 Upsizing
1.5 Downsizing
1.6 Integration

2. Introduction to server hardware and OS


[4 Hrs]
2.1 Investigating different types of servers
2.1.1 Tower server
2.1.2 Rack server
2.1.3 Blade server
2.2 Overview of network OS
2.2.1 Linux server
2.2.2 Windows server
2.2.3 Solaris
2.3 Emerging server hardware technologies
2.4 Installation of Linux/Unix OS

3. Data storing, fault-tolerance techniques and storage area network


(SAN) [7 Hrs]
3.1 File system management
3.1.1 Overview of file system
3.1.1.1 FAT
139
bitnepal.blogspot.com
3.1.1.2 NTFS
3.1.1.3 EXT3/4
3.1.1.4 ZFS
3.1.2 Making EXT3/FAT file system
3.1.3 Making Swap Disk
3.1.4 Mounting file system
3.2 Managing different file system in network (NFS, CIFS/Samba)
3.2.1 Overview of NFS
3.2.2 Configuration of NFS in Unix
3.2.3 Overview of CIFS/Samba
3.2.4 Installation and configuration of CIFS/Samba in Unix
3.3 Disk technologies
3.3.1 ATA
3.3.2 SATA
3.3.3 SAS
3.3.4 SCSI
3.4 Storage area network
3.4.1 Introduction
3.4.2 Protocols (Fiber Channel, iSCSI, FCoE)
3.5 Disk storage fault tolerance (RAID)
3.5.1 Types (RAID 1 to 6)
3.5.2 Configuration of RAID 0, 1 and 5

4. Administrative and network operational models


[5 Hrs]
4.1 Concepts of administrative models
4.2 Domain
4.3 Tree
4.4 Forest
4.5 Global catalog
4.6 Schema master
4.7 Light Weight Directory Access Protocol (LDAP)
4.8 Basic installation and configuration of OpenLDAP server and client

5. Configuration of basic network services


[8 Hrs]
5.1 Introduction of network protocols
5.2 TCP/IP
5.2.1 Configuration of network interface
5.2.2 Configuration of basic route
140
bitnepal.blogspot.com
5.2.3 Using hosts file DNS and DHCP client tools
5.3 DHCP
5.3.1 Overview
5.3.2 Installation and configuration of DHCP server in Unix system
5.4 DNS
5.4.1 Overview
5.4.2 Iterative and recursive query
5.4.3 DNS record
5.4.4 Dynamic DNS
5.4.5 Installation and configuration of DNS in BIND
5.5 File server
5.5.1 Overview of FTP server
5.5.2 Installation and configuration of FTP server
5.6 Web server
5.6.1 Overview
5.6.2 IP based vs. virtual hosting
5.6.3 Configuration of web server in Apache or other open source web server
5.6.4 Installation and configuration secure web server

6. Network monitoring and control


[4 Hrs]
6.1 Overview of network monitoring and management
6.2 Network monitoring architecture
6.3 Account monitoring and control
6.4 Security control
6.5 User environment configuration and protocol
6.6 Fault monitoring
6.7 Installation and configuration of SNMP daemon in Unix system
6.8 Installation and configuration open source network monitoring tools
(MRTG and Nagios or any other open source tools)

7. System startup, automation and scheduling jobs


[3 Hrs]
7.1 Configuration of services in startup
7.2 Scheduling jobs with cron and at commands in Unix
7.3 Shell scripting
7.3.1 Overview of variables and environmental variables
7.3.2 Basic structure
7.3.3 Control statement
7.3.4 Control statement and loops
141
bitnepal.blogspot.com
7.3.5 Functions
7.3.6 Sample of real work scripts

8. Disaster recovery [3
Hrs]
8.1 Disaster recovery plan
8.2 Backup plan
8.2.1 Overview
8.2.2 Consideration of backup media
8.2.3 Types of backup (full, incremental, differential)
8.2.4 Installation and configuration of backup and recovery in Unix
8.3 Concepts of disaster recovery sites
8.4 Concepts of disaster recovery with the help of virtualization and cloud
environment

9. Virtualization and cloud infrastructure


[4 Hrs]
9.1 Virtualization
9.1.1 Overview
9.1.2 Advantages
9.1.3 Types of virtualization
9.1.4 Managing virtual machine with KVM/Xen
9.2 Cloud infrastructure
9.2.1 Overview
9.2.2 Types of cloud
9.2.3 Private cloud vs. public cloud
9.2.4 Introduction of OpenStack
9.2.4.1 Basic installation and configuration with packstack
9.2.4.2 Configuration of virtual machine with web interface (Horizon)
9.2.5 Overview of public loud
9.2.5.1 Amazon AWS EC2
9.2.5.2 Rackspace and more

10. Network security


[5 Hrs]
10.1 Attack services and mechanisms and counter measures
10.1.1 SQL injection
10.1.2 Cross site scripting
10.1.3 IP and ARP spoofing
10.1.4 DOS and DDOS attack
142
bitnepal.blogspot.com
10.1.5 Man in the middle attack
10.1.6 Hijacking
10.1.7 Virus, worms, Trojans
10.2 Cryptography
10.2.1 Conventional encryption and message confidential
10.2.2 Public-key cryptography and message authentication
10.2.3 Configuration of private key and public key cryptography in Unix
10.3 Network security application
10.3.1 Overview of Kerberos
10.3.2 Pretty good privacy assignment
10.4 IP security
10.4.1 Firewalls
10.4.1.1 Overview
10.4.1.2 Types of firewalls
10.4.1.3 Basic configuration of firewall with iptables (in Linux)
10.4.2 Virtual private network
10.4.2.1 Overview
10.4.2.2 Types of VPN
Laboratory
There shall be lab exercises covering all features of above chapters.

Reference books
 “Essential System Administration”, 2nd edition, Eleen Frisch, publisher: O’Reilly
media
 “Principles of Network and System Administration”, Mark Burgess
 “Backup and Recovery”, W. Curits Preston, O’Reilly media
 “Network security with OpenSSL”, John Viega, Matt Messier and Pravir
Chandra, O’Reilly media
 “LDAP System Administration”, Gerald Carter, O’Reilly media
 “Unix and Linux System Administration” handbook (4th edition), Evi Nemeth,
Garth Snyder, Trent R. Hein
 “Comptia Security + Study Guide” by Emmett Dulany, Sybex.

143
bitnepal.blogspot.com
Project – VIII
BIT 479CO

Full marks: 100


Internal: 40
Final: 60

Course objectives
After finishing this project, student will be able to develop professional
application.

Course content
 There should be total of 45 hours covering important feature of software
engineering practices, RDBMS and any object oriented programming.
 The application project will be assigned in a group of two/three students.
 An interested topic will be collected and instructed to each group.
 Students must develop the assigned application, submit written report and
give oral presentation

Project evaluation criteria


The internal practical marks allotted for the project should be based on the
following criteria:
 Mid-term presentation – 10 marks
 Pre-final submission and presentation – 20 marks
 Final presentation – 10 marks

The external marks should be given based on the following criteria:


 Presentation – 10 marks
 Project – 20 marks
 Documentation – 20 marks
 Viva – 10 marks

144
bitnepal.blogspot.com

You might also like